Hillary Clinton: Edward Snowden's Leaks Helped Terrorists

Clinton spoke at University of Connecticut earlier this week. Clinton spoke at University of Connecticut earlier this week. Jessica Hill/AP

Speaking at the University of Connecticut on Wednesday night, Hillary Clinton made a restrained but nonetheless damning attack against Edward Snowden.

At the event, an interviewer asked Clinton whether she thought the former National Security Agency contractor's disclosures about its domestic spying programs had any positive effects on American security policy or public discourse.

Without ever explicitly mentioning the NSA's spying programs, Clinton justified their utility in protecting the U.S. from another terrorist attack in the wake of 9/11.

"People were desperate to avoid another attack, and I saw enough intelligence as a senator from New York, and then certainly as secretary [of State], that this is a constant—there are people right this minute trying to figure out how to do harm to Americans and to other innocent people," Clinton said. "So it was a debate that needs to happen, so that we make sure that we're not infringing on Americans' privacy, which is a valued, cherished personal belief that we have. But we also had to figure out how to get the right amount of security."

As for Snowden's role in exposing the NSA programs, Clinton insinuated that she found his motives suspicious.

"When he emerged and when he absconded with all that material, I was puzzled because we have all these protections for whistle-blowers. If he were concerned and wanted to be part of the American debate, he could have been," she said. "But it struck me as—I just have to be honest with you—as sort of odd that he would flee to China, because Hong Kong is controlled by China, and that he would then go to Russia—two countries with which we have very difficult cyberrelationships, to put it mildly."

Let's take a moment to parse Clinton's language here. She didn't call Snowden a traitor, or plainly say that him leaving the country made her suspicious. In American politics, it's never good to come right out and accuse someone of wrongdoing—you can just say you're "confused" or "puzzled" by their actions. In the same way, "odd" or "strange" often serve as semantic placeholders for "bad." Just ask Rep. Paul Ryan, who abruptly ended a television interview in 2012 after an unwelcome remark about tax cuts, then told his interviewer, "That was kind of strange. You trying to stuff words in people's mouths?"

Clinton stressed the strangeness of Snowden's decision to flee to countries that have perpetrated cyberattacks against the U.S. She noted that when State Department officials would travel to Russia or China on diplomatic business, they would leave their cell phones aboard the plane with their batteries taken out. "It's not like the only government in the world doing anything is the United States," she said.

"I think turning over a lot of that material—intentionally or unintentionally—drained, gave all kinds of information, not only to big countries, but to networks and terrorist groups and the like. So I have a hard time thinking that somebody who is a champion of privacy and liberty has taken refuge in Russia, under Putin's authority."

With sarcasm creeping into her voice, Clinton implied that Snowden acted all too friendly toward Vladimir Putin, whose country has been harboring Snowden since last August.

"And then he calls in to a Putin talk show and says, 'President Putin, do you spy on people?' And President Putin says, 'Well, from one intelligence professional to another, of course not.' 'Oh, thank you so much!' I mean really. I don't know, I have a hard time following it."

It will be interesting to contrast Clinton's remarks with Sen. Rand Paul's when he speaks at Harvard University on Friday afternoon. In all likelihood, he'll rehash the same jokes he made when he spoke at Berkeley in March about the NSA listening in on his cell-phone conversations. Meanwhile, Bill Clinton has called Snowden an "imperfect messenger" for bringing the debate about privacy versus national security to the fore.

Both Hillary Clinton and Paul are trying to win over college students to their philosophy. If applause decibels are any indication, though, students favor lionizing the whistle-blower over shaming him.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.